Patents
Patents for G06F 21 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity (119,294)
07/2013
07/24/2013CN103218646A All-in-one digital mobile card and implementation method thereof
07/24/2013CN103218580A USB (universal serial bus) isolating equipment and isolating method thereof
07/24/2013CN103218579A Method for preventing content on screen from being peeped, and mobile terminal thereof
07/24/2013CN103218578A 终端和显示控制方法 Terminal and display control method
07/24/2013CN103218577A Delivering data from a secure execution environment to a display controller
07/24/2013CN103218576A System and method for preventing electronic files from being copied
07/24/2013CN103218575A Host file security monitoring method
07/24/2013CN103218574A Hash tree-based data dynamic operation verifiability method
07/24/2013CN103218573A Traceless access controlling method and device based on protection of visual magnetic disc
07/24/2013CN103218572A Memory address translation-based data encryption/compression
07/24/2013CN103218571A System and method for temporary secure boot of an electronic device
07/24/2013CN103218570A Apparatus and method of portable terminal for application data protection
07/24/2013CN103218569A Method to replace bootloader public key
07/24/2013CN103218568A Privacy protection method during text display and communication terminal
07/24/2013CN103218567A Method and system for hiding data storage
07/24/2013CN103218566A Active defense system based on Android platform software behavior detection
07/24/2013CN103218565A Novel USB (universal serial bus) key and transaction method adopting same
07/24/2013CN103218564A Mobile terminal protection method and mobile terminal protection device
07/24/2013CN103218563A Software vulnerability exploitation shield
07/24/2013CN103218562A Reliable protection method and system for mobile terminal
07/24/2013CN103218561A Tamper-proofing method and device for protecting browser
07/24/2013CN103218560A Method of realizing card data management
07/24/2013CN103218559A 供应链保护系统 Supply Chain protection system
07/24/2013CN103218558A Method for preventing password eavesdropping
07/24/2013CN103218557A Biological-recognition-based system theme recognition method and device
07/24/2013CN103218556A Sounding system and sounding method based on fingerprint information
07/24/2013CN103218555A Logging-in method and device for application program
07/24/2013CN103218554A System and method for controlling user action on basis of user action adaptation
07/24/2013CN103218553A Authorizing method and system based on trusted platform module
07/24/2013CN103218552A Safety management method and device based on user behavior
07/24/2013CN103218551A Method for protecting java programs
07/24/2013CN103218550A Software-installing method, server and terminal
07/24/2013CN103218549A Method and device for encrypting and decrypting Java source code
07/24/2013CN103218548A Method and device of small web format (SWF) file encrypting protection
07/24/2013CN103218547A Method and device for encrypting SWF (Shock Wave Flash) files in batches
07/24/2013CN103218546A Method and apparatus for managing time-limited contents in an electronic device
07/24/2013CN103218545A Charging terminal, and data transmitting/receiving system using the same
07/24/2013CN103218397A Privacy protecting method for social network based on undirected graph modification
07/24/2013CN103218384A Terminal device, information processing method, program, and storage medium
07/24/2013CN103218318A Encrypted mobile hard disk drive with high safety and use method thereof
07/24/2013CN103218144A Device and method for controlling state of display screen and device and method for presetting target point
07/24/2013CN103218142A Unlocking method and unlocking system of terminal equipment
07/24/2013CN102508534B Startup control method of credible main board
07/24/2013CN102270287B Trusted software base providing active security service
07/24/2013CN102129531B Xen-based active defense method
07/24/2013CN102110217B Method for automatic repairing through virtual machine station rotation
07/24/2013CN101996218B Method for realizing data access authority control
07/24/2013CN101911053B Federated entertainment access service
07/24/2013CN101884047B Intrusive software management
07/24/2013CN101872297B Microprocessor and method for limiting access
07/24/2013CN101667130B Embedded system with authentication, and associated authentication method
07/24/2013CN101663671B Authorization for access to web service resources
07/24/2013CN101601045B Secure serial number
07/24/2013CN101601044B Apparatus and methods for securing architectures in wireless networks
07/24/2013CN101243463B 反网络钓鱼保护 Anti-phishing protection
07/24/2013CN101052042B 安全系统 Security System
07/23/2013US8495757 System and method for placing an electronic apparatus into a protected state in response to environmental data
07/23/2013US8495756 Information processing apparatus including locking function, locking (unlocking) method for information processing apparatus and program thereof
07/23/2013US8495755 Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system
07/23/2013US8495754 Dual trust architecture
07/23/2013US8495753 Electronic meeting management system for mobile wireless devices
07/23/2013US8495751 Systems and methods for controlling access to content distributed over a network
07/23/2013US8495748 Mechanism for generating vulnerability reports based on application binary interface/application programming interface usage
07/23/2013US8495743 Methods and apparatus providing automatic signature generation and enforcement
07/23/2013US8495741 Remediating malware infections through obfuscation
07/23/2013US8495734 Method and device for detecting an erroneous jump during program execution
07/23/2013US8495724 Secure server architecture for web based data management
07/23/2013US8495723 Method and system for the supply of data, transactions and electronic voting
07/23/2013US8495720 Method and system for providing multifactor authentication
07/23/2013US8495708 Resource authorizations dependent on emulation environment isolation policies
07/23/2013US8495640 Component-specific disclaimable locks
07/23/2013US8495638 Component-specific disclaimable locks
07/23/2013US8495633 Interpreting I/O operation requests from pageable guests without host intervention
07/23/2013US8495392 Systems and methods for securely deduplicating data owned by multiple entities
07/23/2013US8495389 Locking changing hard disk content to a hardware token
07/23/2013US8495388 Method and device for protecting a program comprising a functional block
07/23/2013US8495385 Adapter for portable storage medium and method of disabling data access
07/23/2013US8495384 Data comparison system
07/23/2013US8495383 Method for the secure storing of program state data in an electronic device
07/23/2013US8495382 In-circuit security system and methods for controlling access to and use of sensitive data
07/23/2013US8495381 Authenticated remote PIN unblock
07/23/2013US8495379 Method and system for managing a hierarchy of passwords
07/23/2013US8495364 Image processing apparatus and method using electronic signature information
07/23/2013US8495359 System and method for securing an electronic communication
07/23/2013US8495348 Efficient root booting with solid state drives and redirect on write snapshots
07/23/2013US8495296 System and method for optimizing data remanence over hubrid disk clusters using various storage technologies
07/23/2013US8495212 Internet identity graph and social graph management system and method
07/23/2013US8495035 Systems and methods for providing data integrity protection in a storage medium
07/23/2013US8494969 Cryptographic server with provisions for interoperability between cryptographic systems
07/23/2013US8494964 Software as a service via virtualization
07/23/2013US8494928 Methods and apparatus for complementing user entries associated with events of interest through context
07/23/2013US8494166 Use of indirect data keys for encrypted tape cartridges
07/23/2013US8494164 Method for connecting wireless communications, wireless communications terminal and wireless communications system
07/23/2013US8493577 Control device, image forming apparatus, printing system, control method, and control program
07/23/2013US8490861 Systems and methods for providing security information about quick response codes
07/23/2013CA2650163C System and method for secure provision of key credential information
07/23/2013CA2507793C System and method for protected operating system boot using state validation
07/23/2013CA2501755C Method and system for limiting software updates
07/20/2013CA2802369A1 Predictive context-aware dynamic lock screen
07/18/2013WO2013106688A2 Authenticating cloud computing enabling secure services